Malware

hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis

hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I’ve found interesting and useful in my reversing work.

A practical guide to the reverse of a complex malware using the example of dissecting a FinSpy module with help of hrtng IDA plugin on securelist

There is no one place in menu where all functionality of the plugin grouped together. hrtng menu items placed closer to logically related standard IDA & Hex-Rays decompiler functions. Messages, menu items, popup windows and dialog boxes belong to this plugin are marked with “[hrt]” prefix.

The plugin requires Hex-Rays decompiler presence in your IDA installation. The plugin can be compiled with IDA SDK >= 7.3 but not well tested with old versions.

Special thanks to following peoples for their great plugins were used as base for my work:

  • Milan Bohacek, hexrays_tools and hexrays_hlight
  • HexRaysDeob by Rolf Rolles and Takahiro Haruyama
  • Karthik Selvaraj Krypton plugin
  • Ali Rahbar, Ali Pezeshk and Elias Bachaalany GraphSlick plugin
  • Markus Gaasedelen AVX support for the Hex-Rays x64 Decompiler

Features Of The Plugin:

Automation

  • Pull up comments from disasm to pseudocode view
  • Automatic renaming local and global variables, struct members
  • Automatic enum substitution
  • COM helper

Interactive Pseudocode Transformation

  • User interactive renaming/retyping assistance
  • Assists with changing type of structure member or local/global variable
  • reinterpret_cast
  • Collapse selection
  • “offsetof” convertor

Decryption

  • Strings/data/const decryption
  • Build stack strings (optionally with decryption)
  • Build array strings (optionally with decryption)
  • Mass strings decryption

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

7 hours ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

8 hours ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

8 hours ago

How to Undo and Redo in Vim or Vi

Vim and Vi are among the most powerful text editors in the Linux world. They…

8 hours ago

How to Unzip and Extract Files in Linux

Working with compressed files is a common task for any Linux user. Whether you are…

8 hours ago

Free Email Lookup Tools and Reverse Email Search Resources

In the digital era, an email address can reveal much more than just a contact…

8 hours ago